MUMBAI, India, Feb. 6 -- Intellectual Property India has published a patent application (202641007148 A) filed by Pragati Engineering College, Peddapuram, Andhra Pradesh, on Jan. 24, for 'system and method for intelligent code analysis and vulnerability assessment.'

Inventor(s) include Mr. Krishna Chaitanya Pidugu; Mr. Medidi Veerababu; S. Padmavathi; P Lavanya; and A. V. V. D. Sivakala.

The application for the patent was published on Feb. 6, under issue no. 06/2026.

According to the abstract released by the Intellectual Property India: "System and Method for Intelligent Code Analysis and Vulnerability Assessment The present disclosure relates to a system and method of performing intelligent analysis of software code for the purpose of identifying vulnerabilities in computer systems. The software can be executed in a monitored environment to help determine its behaviour during execution in real time using execution-context-based fingerprints. Different indicators, such as the way software accesses memory, how it moves about between different pieces of code, and the overall activity of each instruction will all provide insight into potential security risks. When performing analysis, real time measurements are taken from various types of hardware regarding their operation; for example, measuring CPU load or assessing how quickly a memory request is responded to. Using the two types of data collected (execution-context print and hardware measurements), a correlation can be established; thereby determining the extent to which any of the hardware measurements affect how vulnerable the program is to exploitation. This methodology further allows for the identification of computer code vulnerabilities to be localised based upon the specific sequence of instructions used to execute the program; calculating the dynamic trust degradation profiles of suspected exploitation routes; and finding vulnerabilities that may not have been previously detected, without using predefined signature databases. A tamper-resistant object (PO) is created, as part of the vulnerability analysis process, in order for customers to view how their software has been corrected, after a patch to an existing program has been created. In this way, businesses can continue to provide a high level of security for their customers while still enjoying the benefits of increased reliability and improved code execution integrity."

Disclaimer: Curated by HT Syndication.